-
1
-
-
33846063041
-
Covert Distributed Processing With Computer Viruses
-
Springer-Verlag
-
S. R. White. Covert Distributed Processing With Computer Viruses. In Advances in Cryptology -- Crypto '89 Proceedings, pages 616-619, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology -- Crypto '89 Proceedings
, pp. 616-619
-
-
White, S.R.1
-
2
-
-
84956855977
-
-
valid at 9 Feb
-
Sun Microsystems. The Java TM Language: An Overview. See http://java,sun.com/docs/overviews/java/java-overview-1.html [URL valid at 9 Feb. 1998].
-
(1998)
The Java TM Language: An Overview
-
-
-
3
-
-
58149365227
-
-
Network Security, December, See also, valid at 20 Apr
-
Frederick B. Cohen. Internet holes: 50 ways to attack your web systems. Network Security, December 1995. See also http://all.net/journal/netsec/9512.html [URL valid at 20 Apr. 1998]
-
(1995)
Internet Holes: 50 Ways to Attack Your Web Systems
-
-
Cohen, F.B.1
-
4
-
-
0029709794
-
A Note on Distributed Coordinated Attacks
-
Frederick B. Cohen. A Note on Distributed Coordinated Attacks. Computers & Security, 15:103-121, 1996.
-
(1996)
Computers & Security
, vol.15
, pp. 103-121
-
-
Cohen, F.B.1
-
5
-
-
0029697575
-
Java Security: From Hot Java to Netscape and Beyond
-
See also, valid at 9 Feb
-
Edward W. Felten, Drew Dean and Dan S. Wallach. Java Security: From Hot Java to Netscape and Beyond. In IEEE Symposium on Security and Privacy, 1996. See also http://www.cs.princeton.edu/sip/pub/secure96.html [URL valid at 9 Feb. 1998]
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Felten, E.W.1
Dean, D.2
Wallach, D.S.3
-
6
-
-
0011192576
-
Web spoofing: An Internet Con Game
-
Princeton University, In 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997. See also, valid at 9 Feb. 1998]
-
Drew Dean, Edward W. Felten, Dirk Balfanz and Dan S. Wallach. Web spoofing: An Internet Con Game. Technical report 540-96, Department of Computer Science, Princeton University, 1997. In 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997. See also http://www.cs.princeton.edu/sip/pub/spoofing.html [URL valid at 9 Feb. 1998]
-
(1997)
Technical Report 540-96, Department of Computer Science
-
-
Dean, D.1
Felten, E.W.2
Balfanz, D.3
Wallach, D.S.4
-
8
-
-
84955587328
-
-
See, valid at 12 Feb
-
M. D. LaDue. Hostile Applets on the Horizon. See htttp://www.rstcorp.com/hostile-applets/HostileArticle.html [URL valid at 12 Feb. 1998].
-
(1998)
Hostile Applets on the Horizon
-
-
Ladue, M.D.1
-
9
-
-
84956857777
-
-
valid at 9 Feb
-
RFC 1945 "Hypertext Transfer Protocol -- HTTP/1.0". See http://www.w3.org/Proltocols/rfcl945/rfcl945 [URL valid at 9 Feb. 1998].
-
(1998)
Hypertext Transfer Protocol -- HTTP/1.0
-
-
-
10
-
-
84937689586
-
Hypertext Transfer Protocol -- HTTP/1.1
-
valid at 9 Feb
-
RFC 2068 "Hypertext Transfer Protocol -- HTTP/1.1". See http://www.w3.org/Protocols/rfc2068/rfc2068 [URL valid at 9 Feb. 1998].
-
(1998)
-
-
|